Search the dblp DataBase
Xiaoyun Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hongbo Yu , Gaoli Wang , Guoyan Zhang , Xiaoyun Wang The Second-Preimage Attack on MD4. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:1-12 [Conf ] Xiaoyun Wang , Hongbo Yu , Yiqun Lisa Yin Efficient Collision Search Attacks on SHA-0. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:1-16 [Conf ] Xiaoyun Wang , Yiqun Lisa Yin , Hongbo Yu Finding Collisions in the Full SHA-1. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:17-36 [Conf ] Xiaoyun Wang , Lizhen Yang , Kefei Chen SDD: Secure Distributed Diffusion Protocol for Sensor Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2004, pp:205-214 [Conf ] Xiaoyun Wang , Xuejia Lai , Dengguo Feng , Hui Chen , Xiuyuan Yu Cryptanalysis of the Hash Functions MD4 and RIPEMD. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:1-18 [Conf ] Xiaoyun Wang , Hongbo Yu How to Break MD5 and Other Hash Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:19-35 [Conf ] Hongbo Yu , Xiaoyun Wang , Aaram Yun , Sangwoo Park Cryptanalysis of the Full HAVAL with 4 and 5 Passes. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:89-110 [Conf ] Xiaoyun Wang , Kefei Chen An efficient proxy signature scheme in home network DRM. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:191-196 [Conf ] Xiaoyun Wang , Lucas Chi Kwong Hui , K. P. Chow , Wai Wan Tsang , C. F. Chong , H. W. Chan Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:167-177 [Conf ] Dengguo Feng , Xiaoyun Wang Progress and Prospect of Some Fundamental Research on Information Security in China. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2006, v:21, n:5, pp:740-755 [Journal ] Hongbo Yu , Xiaoyun Wang Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:206-226 [Conf ] Haina Zhang , Xiaoyun Wang Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:227-238 [Conf ] Xiaoyun Wang , James K. Mills A FEM Model for Active Vibration Control of Flexible Linkages. [Citation Graph (0, 0)][DBLP ] ICRA, 2004, pp:4308-4313 [Conf ] Xiaoyun Wang , James K. Mills Active Control of Configuration-Dependent Linkage Vibration with Application to a Planar Parallel Platform. [Citation Graph (0, 0)][DBLP ] ICRA, 2005, pp:4327-4332 [Conf ] Yuxin Su , Dong Sun , Lu Ren , Xiaoyun Wang , James K. Mills Nonlinear PD Synchronized Control for Parallel Manipulators. [Citation Graph (0, 0)][DBLP ] ICRA, 2005, pp:1374-1379 [Conf ] Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. [Citation Graph (, )][DBLP ] Distinguishing and Second-Preimage Attacks on CBC-Like MACs. [Citation Graph (, )][DBLP ] New Birthday Attacks on Some MACs Based on Block Ciphers. [Citation Graph (, )][DBLP ] Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. [Citation Graph (, )][DBLP ] New Distinguishing Attack on MAC Using Secret-Prefix Method. [Citation Graph (, )][DBLP ] Public Key Encryption without Random Oracle Made Truly Practical. [Citation Graph (, )][DBLP ] Research on the tailoring automatic sub-bed system using algorithm. [Citation Graph (, )][DBLP ] Dual-modal Control of Configuration-dependent Linkage Vibration in a Smart Parallel Manipulator. [Citation Graph (, )][DBLP ] Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. [Citation Graph (, )][DBLP ] New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256. [Citation Graph (, )][DBLP ] Active Flatness Control of Thermally Disturbed Membranes Using an Adaptive Genetic Algorithm. [Citation Graph (, )][DBLP ] Some Mathematical Problems in Cryptanalysis. [Citation Graph (, )][DBLP ] Modal Control Design of Configuration-Dependent Linkage Vibration in a Parallel Robot Through Experimental Identification. [Citation Graph (, )][DBLP ] A Query Optimization Based on Semantic User Focus. [Citation Graph (, )][DBLP ] An Improvement on the Model of Ontology-Based Semantic Similarity Computation. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.303secs